Thursday, 22 November 2012

Some threats and risks that could happen when using a IT communication website could be the system crashing causing you to lose all work and having to start again.also, your computer might get infected with a virus that an effect all the work on the computer.
When using a social network, you will come aross fake accounts. a fake account is people pretending to be someone there not but can also still cyber bully, or if they get ahold of your real details they could come to your house or harrass you using a phone. This is why it could be dangerous if you put up all your details, instead just put up simple things nothing too personal, also there is a problem in copy right, someone could copy what you have said/wrote and pass it off as if it was theirs.

Tuesday, 13 November 2012

unit 1 d1

RISKS AND SAFETY ISSUES?

When signing up for a website, never give away your personal details e.g location, phone number and full name. When creating a password, make sure it isnt an easily guessed password this will help keep keyloggers from hacking into your website. If a keylogger hacks into your device, they can see what your typing, this means your password or what you are saying to others things that could be secret e.g your address, passwords or even bank details ect.. also they can take control of your webcam and you wont even realise it, it could be on for hours even days before you realise. The website you are using can create a virus but it is important that you do not click on anything that either pops up or has been sent to you, this could be a virus and by clicking on them your computer will loose all of its memory, personal items/private information. If you keep your compluter up to date on things such as norton, this can secure your computer and make sure you are safe from viruses. Also, log off before you leave the computer just incase someone can see your account, and make sure when you log into a public computer it does not automatically save your password, if you did this anyone could access your account and hack into it finding out all your personal details.

unit 1 m1

Blog spot is a effective method of communitcation because you are able to upload work very quickly and others can comment/give feed back and you are able to give feedback to others. it is easy to use, not a complicated website. also you are able to access blogspot outside of school which is very good. the work you upload is immediently viewable and you get emails send to your gmail when you have feedback, it is also eco friendly and is used by a majority of the internet users.

Thursday, 11 October 2012

m3

mechanisms-
it was suggested that to prevent  or control the implications described for P 6 were.

  • don't stare at the screen for too long.
  • don't sit in the same place for too long bending over trying to see a screen
  • go out with your friends before spending time on a computer
  • try only using it a couple times a week this helps the environment
  • turn the computer off completely instead of standby
  • have breaks every half hour or so.

m1

DEAR APPLICANTS.


The characteristics needed for this job are very important,
You must be able to work well with others because you won’t be able to do this job alone as well as you will be working with others from different company’s and if they don’t think you are working well with them then it could change their opinion in the project.

You must be organised this means doing the jobs given to you when you first get them and not letting all the work pile up, if the work piled up then it will cause problems on the deadline date and you would of rushed most of it just to complete it all so most of the work won’t be completed to standard. These are only a few reasons why it is important to be organised.

Also, if you’re not experienced in i.t then there is no point in taking this job you will be surrounded by technology every day and if you are not able to do the tasks given then you will find this job very very hard but we would like you to enjoy it.

You will have to monitor the activities others are doing because if there’s any mistakes you will get the blame for being careless. It is important that nothing goes wrong; this work will be shared with customers and other company’s.

You must take others ideas on board not just your own, this helps in being a team player and working well with others, some might have a good idea and it is your job to consider them.

We hope that you make the correct choices in choosing this job

Yours sincerely

It jobs UK

Thursday, 20 September 2012

D1

D1

if you are independent, skilled in the organising/planning area, have very good confidence but also have technical knowledge then the perfect job for you would be a it project manager. in this job, you would organise & plan the work for others, speak to them in groups and help them to achieve the objectives.

unit 2 task 1 p1


Thursday, 6 September 2012

m2

The main differences from sending information or data from a location off his smart phone is that it would be slower & cost more than sending information or data from his own house, it would not cost anything and it would also be sent faster.

m1


How do protocols and devices keep data safe?
Data can be kept safe buy using security on your device/protocols. Also they can use a variety of passwords so that only you can access your data but use a secure password that isnt easy to guess for example ..chicken123. Devices and protocols can also transfer your data into a memory stick just in case the data erases on the protocols and devices.
ENCRYPTION.
encryption is a process where you can transfer information where you are the only one able to read it. it is usually referred to as a key.

Wednesday, 5 September 2012